Receive an alert when Certified Expert Identity Governance (CEIG)® becomes available.
Third-party products and services, including course instructors have helped many candidates to close knowledge and skill gaps. Lunarline does not endorse any particular provider and encourages candidates to use a variety of tools and resources that will enhance their understanding of relevant principles and the exam’s concentration area.
Certification Description
Successful completion of this exam will demonstrate a candidate’s ability to understand technical and policy requirements to securely develop and administer Identification and authorization governance to meet organizational security and privacy requirements. The candidate will be able to implement organizational wide and system-level security and privacy principles in the design, development, operation, and testing of identity governance controls.
The candidate will be able demonstrate their ability to implement security and privacy data controls for federal information systems and other organizations. The candidate will have knowledge of relevant laws, policies, procedures, or governance related to identity governance.
Requirements
Candidates must possess at least 3 years of experience in identify and authorization management, analysis or engineering, or related identity governance information security or privacy compliance and policy in order to obtain the expert level credential. The associate level credential will be awarded to those who pass the exam, but do not have the required experience. The credential can be elevated to expert level upon attaining the required experience. Simply email [email protected] to start the experience verification process.
Mapping to the NICE Framework
NICE Work Role Name:
Cyber Defense Analyst
NICE Framework Category
CCE® Concentration Area:
Protect and Defend (PR)
NICE Specialty Area:
Cybersecurity Defense Analysis (CDA)
NICE Work Role ID:
PR-CDA-001
OPM Code | DCWF Code:
511
NICE Work Role Description:
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
Lunarline Training Courses:
Continuing Education: The Lunarline SCS Training Program and other third-party vendors offer activities, products and services across the country that qualify as Professional Development Credits (PDCs) that target the same NICE category, specialty area, work role, and/or authoritative sources as our certifications. We encourage candidates to use a variety of tools and resources that will enhance their understanding of relevant principles and reflect their learning styles and needs.
- Continuous Monitoring and Security Operations (CO266)
- Counterintelligence for IT and Cybersecurity Professionals (AN209)
- Counterintelligence for IT and Cybersecurity Professionals - SP (AN209-SP)
- Cyber Defense Analyst (PR101-RBT)
- Cybersecurity Bootcamp (CYB101)
- Cybersecurity Fundamentals (CYB101)
- Cybersecurity Fundamentals - SP (CYB101-SP)
- Cybersecurity Fundamentals - WBT (CYB001-WBT)
- Cybersecurity Tools and Analysis (PR210)
- Implementing and Securing Your Virtual Environment (OM112)
- Implementing and Securing Your Virtual Environment - WBT (OM012-WBT)
- Information Systems Continous Monitoring for Philips (CO131-PHI)
- Information Systems Continuous Monitoring (CO212)
- Insider Threat Awareness - WBT (AN002-WBT)
- Privacy for IT/ISS Professionals (OV231)
- Privacy for IT/ISS Professionals - SP (OV231-SP)
- Python for Cybersecurity Professionals (SP104)
- Securing Wireless Networks (OM210)
- Securing Your Digital Environment (SP144)
- Securing Your Digital Environment - WBT (OM044-WBT)
- System Exploits and Intrusion Detection (AN211)
- Warrior to Cyber Warrior Bootcamp (W2CW101)
- Windows System Security Auditing (OM208)
- Windows System Security Auditing - SP (OM208-SP)